One Step Ahead: Almanac Security Tips

In each issue, Penn's Journal of Record, The Almanac publishes helpful tips and hints for dealing with information security and privacy matters. This page is a collection of all those published thus far.

New! You can now receive new One-Step-Ahead Security and Privacy Tips automatically!You can subscribe via Email or RSS.

Table of Contents

Tuesday, September 9, 2008 - Almanac Vol. 55, No. 3

Computrace Best Practices

In recent years, the use of mobile computing devices, including laptop computers, has increased dramatically. Because such devices can easily be lost or stolen—putting both the device itself and data stored on it at risk—there has been a corresponding increase in adoption of security measures. At Penn, one security measure that is commonly used, and in some cases is required, is installation of Computrace software on laptops.

Computrace software has two major features. First, it allows authorized individuals to track the location of the laptop (or other mobile computing device) by causing the device to “call in” via the Internet at periodic intervals. With assistance from law enforcement officials, the information “called in” can often be used to find the location of the stolen device. In addition, Computrace offers a feature that can enable remote wiping of sensitive data if a device is lost or stolen. This capability can often protect the privacy of confidential data stored on such devices.

Best Practices have recently been developed to promote efficient and effective use of Computrace by Penn constituents. These recommendations can be viewed at www.upenn.edu/privacy, click on Computrace Best Practices.